Vaidehi is an engineer at Tilde, in Portland, Oregon, where she works on Skylight. She enjoys building and breaking code, but loves creating empathetic engineering teams a whole lot more. In her spare time, she runs basecs, a weekly writing series that explores the fundamentals of computer science, and is co-host of the Base.cs Podcast.
Matt is a software developer at JUMO.world in Nairobi. He has a passion in building tech for social impact. He is also the co-organiser of Rust Nairobi, and hopes to make the tech industry a better place by encouraging learning and mentorship in his community. He plays tennis and is a big scrabble fan.
Team Lead at Exonum, Bitfury Group, Rust developer. Experience in software development more than 12 years. 3 last years I use Rust full-time. I created: HFT-robots, OTT-services, many corporate projects. Now I working on blockchain solutions and believe in WebAssembly revolution.
This is a talk about the architecture of
I’ve studied Applied mathematics at Yerevan State University (Bachelors). Most of my career worked as a freelancer, technical supervisor and independent consultant for different companies helping them to build scalable applications (frontend and backend). Had previous small startup exit and started TreeScale as a core game changing technology for building scalable real time applications. Made solo trip across Europe (~6000KM) on a Motorcycle, and Skiing all winter.
Real-time networking applications becoming more popular, but building backend systems is challenging in terms of memory and cpu efficiency. This is a story about how at TreeScale (github.com/treescale) we got 10X+ memory and cpu efficiency using Rust MIO as a main network TCP/UNIX handling system with thread pools.
I’m Joe, from Cambridge, England. I’ve been working in crypto, computer security and embedded development since 2005; building HSMs, mobile authentication, and securing IoT devices.
rustls is an open-source Transport Level Security (TLS) stack written in safe Rust. This talk reviews the current state of TLS support in the Rust ecosystem, and the design choices taken in
Henri started participating in the Mozilla project in 1999 and now works at Mozilla on the Gecko engine. In late 2012, as his first Rust project, he started porting Gecko’s HTML parser, which he wrote, to Rust, but the project was abandoned due to a change in priorities. He returned to Rust post-1.0 to write the encoding_rs crate as a replacement of Gecko’s previous character encoding conversion library.
In Firefox 56, the
encoding_rs character encoding conversion crate replaced Firefox’s previous encoding conversion library that was written in C++. This talk examines the API design characteristics that allowed the Rust API of
encoding_rs to be mapped to an idiomatic C API and how it was possible to re-create an almost exact modern C++ analog of the Rust API on top of the C API. Rather than trying to cover the mapping of an arbitrary Rust API to C++, this talk focuses on patterns that are easy to map to C++ to help others to aim for such patterns when bringing Rust to C++ code bases.
Senior Embedded Systems Consultant at Cambridge Consultants, specialising in wireless communications systems. MEng in Computer Systems Engineering from the University of Warwick, England. Organiser of #CambridgeRust. Inveterate tinkerer. Raspberry Pi enthusiast.
I missed the simplicity of of computers like the C64 and the Apple 2 and I wondered if I could recreate something like that, but using the Cortex M4 devboard on my desk and a handful of resistors. Can you generate VGA without a video chip? Can you render text without enough RAM for a framebuffer? Can you read from a PS/2 keyboard? Can you do it all in Rust, and run tests on an actual PC? Will it run fast enough to be useful?
Meet Monotron — an excercise in doing things the hard way.
Yu Ding is a staff security scientist at Baidu X-Lab. His research interest is security issues around Intel SGX and security protocol analysis. He is a zealot of security oriented software development and dedicated to build a memory safety world.
In this talk, we introduce Rust SGX SDK (future code name MesaLock SGX), which can protect secrets from most attacks by combining the power of Intel SGX and Rust.
Intel SGX is the next generation trusted computing technique supported in almost all recent Intel CPUs. It provides strong security guarantees and uses a completely different os/threading model, but lacks memory safety guarantees. We show how we ported Rust
std and a series of fundamental and popular Rust crates into the Rust-SGX world. What’s more, we support Xargo by providing a new target platform as
Nicolas (aka Nical) is a graphics engineer at Mozilla, currently working on WebRender which will soon bring even more Rust to your favorite web browser.
Lyon is a collection of low level tools to render 2D vector graphics on the GPU, useful for games as well as other applications benefiting from vector graphics (map renderers, web browsers, graphical user interfaces, creative coding, etc.).
This presentation will start with a very short overview of the type of functionalities lyon provides, followed by a deep dive into how lyon approaches rendering and how it relates to other GPU based vector graphics rendering tools.
There’s a discrepancy between the careful attention to mutability and immutability in Rust itself and the data structures available in the standard library. The only way to update a Vec with an immutable ref is to clone it first, which could get expensive. But what else can you do?
Turns out there’s a number of data structures out there that make it cheap and easy to do immutable copies and updates. Some are so simple it’s ridiculous, some are anything but, and we’re going to dive into some of the more useful ones, how they work, why you should care, and how to best implement them in Rust.
After years of getting whooped by bugs at scale at various North American infrastructure companies, Tyler moved to Berlin where he spends his days reading papers, finding bugs in complex systems, and building Sled - a modern embedded database for the Rust ecosystem. He believes on-call people should sleep as long as they want.
The wild success of testing tools like Jepsen is a wake-up call that we’re approaching systems engineering from a fundamentally bug-prone perspective. Why don’t we find these devastating bugs on our laptops before opening pull requests? Rust’s compiler gives us wonderful guarantees about memory safety, but as soon as we open files or sockets, all hell seems to break loose.
This talk will show you how to apply techniques from the distributed systems and database worlds in a way that maximizes the number of bugs found per cpu cycle, and reduce the amount of bias that we hardcode into our tests.
As a long-time software engineer, the leverage Rust offers to productivity and software reliability is very exciting to me. I believe Rust’s powerful type system, low footprint and high performance make it possible to tackle software engineering challenges that I’d previously have shied away from, including low-level things like networking performance and widely distributed systems.
Once HTTP/2 was standardized in 2015, the IETF started work on an even faster iteration of HTTP, based on QUIC: the Quick UDP Internet Connections protocol. The QUIC community is getting ever closer to standardizing it. While we have great HTTP and HTTP/2 implementations in Rust already, this talk discusses an effort to implement QUIC in pure Rust, based on the futures ecosystem.